Analysis

  • max time kernel
    152s
  • max time network
    155s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20231215-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20231215-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    30/12/2023, 09:52

General

  • Target

    15005678e664c5976c42a3693c4925f3

  • Size

    30KB

  • MD5

    15005678e664c5976c42a3693c4925f3

  • SHA1

    54b0cb6031f07ac9874cbad0b3562d79934e7ce7

  • SHA256

    a86f11569deeeb2c67eaffa60475b6540d8eba0c6023764e1552375f6ab11a54

  • SHA512

    545bd211bdeccff922ade066f2702e6d37ac2c1616dfd0642e4dc0a18c50280820d2a2f8587e60b15ccfc6b71deb6652e558ed1dca92b4b987a1953681c172c2

  • SSDEEP

    768:RwMWMDcaItGROgqykcBRBDt4LeKz6ohZBWI:RwMH/lkcJDt4Ldmo7

Malware Config

Extracted

Family

mirai

Botnet

UNSTABLE

C2

cnsmaccas.duckdns.org

scanmaccas.duckdns.org

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Contacts a large (79738) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Changes its process name 1 IoCs
  • Modifies Watchdog functionality 1 TTPs 2 IoCs

    Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

  • Writes file to system bin folder 1 TTPs 2 IoCs

Processes

  • /tmp/15005678e664c5976c42a3693c4925f3
    /tmp/15005678e664c5976c42a3693c4925f3
    1⤵
    • Changes its process name
    PID:714

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads